Tag Archive for Networking

Nortel Declares Bankruptcy

Chinese hackers had widespread access to Nortel's corporate computer networkUpdated 02-14-12 The Wall Street Journal reported that for nearly a decade before Nortel collapsed  Chinese hackers had widespread access to its corporate computer network.

According to the article, the hackers used seven passwords stolen from top Nortel executives, including the chief executive. The suspected Chinese hackers penetrated Nortel’s computers at least as far back as 2000 and over the years downloaded technical papers, research-and-development reports, business plans, employee emails, and other documents.

Updated 03-12-09 WirelessWeek is citing The Wall Street Journal is reporting that Nortel is in talks to sell its core wireless equipment business as well as a separate unit that builds telecom systems for offices, according to anonymous sources in the WSJ.

The WSJ reported that Nortel is talking to Nokia Siemens Networks, to sell its wireless business. Avaya and Siemens Enterprise Communications, a joint venture of Siemens and technology private equity firm Gores Group, are interested in the company’s enterprise unit. Cisco Systems reportedly looked at the enterprise unit but wasn’t expected to bid. Nortel declined to comment.

Nortel Declares Bankruptcy113-year-old Canadian technology firm Nortel filed for Chapter 11 bankruptcy today. Nortel’s losses in the third quarter ballooned to $3.41 billion and 1,300 people had to be let go. CEO and President Mike Zafirovski wrote on the company’s Website. “Most importantly, Nortel is still very much in business.

Next steps for the former Northern Telecom may include selling various business units or receiving a capital investment as a way to go private, According to Avi Cohen, managing partner at analyst firm Avian Securities, on TheStreet.com,The most likely bidders for Nortel’s assets are Ericsson, Huawei (002502), Nokia Siemens, and Cisco (CSCO). We believe Alcatel-Lucent (ALU) and Motorola are less likely bidders because they are struggling with their own challenges and would have a hard time financing such a purchase.

UBS analyst Maynard Um speculated on CED that the acquisition of Nortel by Huawei would be a possible outcome giving the Chinese firm a significant increase in market access in North America. However, this scenario may run into trouble with the Committee on Foreign Investment in the U.S. (CFIUS) regulations.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Online Security Threats Growing

Online Security Threats GrowingDarkReading is reporting that Ann Arbor-based Arbor Networks has issued its fourth Worldwide Infrastructure Security Report. The global report is based on responses from 70 lead security engineers worldwide. Some of the report’s findings are that DDoS attacks have grown a hundredfold since 2000 and the newest threat is increasing service-level attacks

Arbor Networks logoRespondents to the survey said the main threat vectors for attacks experienced during August 2007 to July 2008, were:

  • external, brute force attacks (61%)
  • known vulnerabilities (12 %)
  • social engineering (3%)
  • misconfiguration (3%)
  • none from zero-day threats.

Brute force attacks, such as DDoS, jumped 67 percent over the last year. ISPs reportedly spent most of their available security resources combating distributed denial of service (DDoS) attacks. Flood-based attacks represented 42 percent of the attacks reported and protocol exhaustion-based attacks at 24 percent last year. DDoS attacks have grown from megabit levels in 2000 to 40-gigabit attacks this year. Nearly 60 percent of ISPs worldwide say they experienced DDoS attacks larger than 1 gigabit-per-second (Gbps) to a record 40 Gbps, according to Arbor’s report. Arbor also indicates the growth in attack size continues to significantly outpace the corresponding increase in underlying transmission speed and ISP infrastructure investment according to Danny McPherson, chief security officer for Arbor Networks.

Bandwidth bottleneckThe report indicates that the ISPs surveyed are less worried about DDoS attacks than they were a year ago. This year ISPs describe a far more diversified range of threats, more than half are battling an increase in service-level attacks which accounted for 17 percent of all attacks, that attempt to exploit vulnerabilities and limitations of computing resources. New attacks are being directed at new services, as ISP’s work to diversify their income sources by expanding into content distribution, VoIP or other managed services. These new threats include:

  • domain name system (DNS) spoofing
  • border gateway protocol (BGP) hijacking
  • spam.

Almost half of the surveyed ISPs now consider their DNS services vulnerable. Others expressed concern over related service delivery infrastructure, including voice over IP (VoIP) session border controllers (SBCs) and load balancers. Several ISPs reported multi-hour outages of prominent Internet services during the last year due to application-level attacks.

Botnets are still a big problem for ISPs. Botnets continue their expansion across the Internet. ISP’s report that botnet used for:

  • SPAM (36%)
  • DDoS (31%)
  • phishing (28%)
  • ID fraud (>5%)
  • click fraud (>5%)

Rob Malan, founder and chief technology officer of Arbor Networks explained that, with application-based attacks, bot-infected computers worldwide make connections to a targeted site, then “use an application protocol to deliver a perfectly valid request, not a vulnerability, not something that an IDS or other type of firewall would necessarily flag”. For example, a botnet might instruct its zombie computers worldwide to do a back-end query off a database. “By itself, it’s not bad but, if you have multiple such requests, then you tie up the application – in this case, database – resources on the back-end,” he said.

Even the newest technologies are not secure, 55 percent of ISPs see the scale and frequency of IPv6 attacks increasing. “They are asked to deploy V6, but they don’t feel they can have security [with it],” Dr. Craig Labovitz chief scientist for Arbor Networks says. Today’s IPS/IDS, firewall, and other tools don’t have the proper visibility into IPv6 networks to secure them, he says. Arbor Networks released an earlier study in August 2008 which revealed negligible IPv6 usage.

The response capability of the respondents is mixed. The majority of ISPs report that they can detect DDoS attacks using tools. This year also shows significant adoption of inline mitigation infrastructure and a migration away from less discriminate techniques like blocking all customer traffic (including legitimate traffic) via routing announcements. Many ISPs also report deploying walled-garden and quarantine infrastructure to combat botnets.

Despite the tools, on hand, only a few of the surveyed ISPs said they have the capability to mitigate DDoS attacks in 10 minutes or less. Even fewer providers have the infrastructure to defend against service-level attacks or this year’s reported peak of a 40-gigabit flood attack.

Even less of an emphasis is placed on finding the criminals responsible for these attacks. Arbor Networks found that ISPs have faith in law-enforcement bodies. Nearly two-thirds of respondents indicated that they do not believe law enforcement has the means to act upon the information they provide about attacks or other security incidents. “It’s hard on carriers,” said Malan. “They get paid on traffic, not to do forensic analysis. So it’s hard from their perspective to make the economics work.”

The Arbor Networks 2008 Worldwide Infrastructure Security Report describes a networked world where DDoS attacks growth has outpaced the ability of firms to respond to them and new service level attacks are driven by botnet’s are matching the firm’s efforts to diversify their service offerings to customers. These facts when combined with the current economic recession, the networked world still appears to be a difficult place to do business.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

IPv6 anyone?

Updated 03-10-09 The web monitoring company Pingdom says that IPv6 traffic at the Amsterdam Internet Exchange (AMS-IX), the Internet’s biggest exchange, accounted for just 0.25 percent of total Internet traffic.

rb- Who says IPv6 isn’t coming? This study shows a 250% increase in IPv6 use from the data reported by Arbor Networks in September 2008.

Arbor Networks released a study The EIPv6 anyone?nd is Near but is IPv6? which says the adoption of IPv6 has been very slow thus far. The network security vendor produced the study along with the University of Michigan and about 100 ISPs and content companies. It suggested that IPv6 adoption is growing but currently amounts to less than one-hundredth of 1% of Internet traffic.

As has been pointed out in this blog IPv4 addresses are running out, but IPv6 is still trying to gain some traction.

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Gigabit Wi-Fi

Gigabit Wi-FiDespite the fact that IEEE 802.11n 100Mbps wireless LAN standard has not been approved yet, the IEEE Very High Throughput (VHT) Study Group is about to launch a new project, gigabit Wi-Fi.

The study group is looking at gigabit Wi-Fi in two frequency bands, high-frequency 60GHz for relatively short ranges and under-6GHz for ranges similar to that of today’s WLANs in the 5GHz band, 802.11a and 11n. The IEEE proposal suggests a completion target date of 2013 for the standard. Big wireless players such as Atheros, Broadcom, Intel, Marvell, Motorola, and Nortel are reported to be active in the study group.

In a Network World article, IEEE readies launch of gigabit Wi-Fi project “The basic idea right now, and that’s subject to change, is that the ‘maximum mandatory mode’ on a single link would be [at least] 500Mbps,” says Tushar Moorti, director of systems architecture for chipmaker Broadcom‘s (AVGO) WLAN Business Unit. “But the further requirement is that [an access point] device that supports VHT would be able to sustain multiple links, so the aggregate would be over 1Gbps.”

“It’s the next-generation technology for wireless LAN, in the same sense that 11n was the follow-on to 11a/b/g,” says Broadcom’s Moorti.

According to the proposal, VHT “will allow a corporate or home user to roam from high-throughput dense cells to wider area networks in a seamless manner, while maintaining full support for the installed base security, management, diagnostics, and backbone infrastructure.” VHT will also be backward compatible with the full range of existing and emerging 802.11 standards, such as 11i for security, and 11s for mesh networking.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Wi-Fi Mesh Standards Coming Soon

Wi-Fi Mesh Standards Coming SoonIt was noted in the July 2006 IEEE Spectrum, that soon (sometime in late 2008) Wi-Fi Access Points (AP’s) will be able to form mesh networks. Mesh Wi-Fi networks can help make wireless networks cheaper to build and operate by allowing a group of AP’s to communicate with each other and share only one high-speed connection to the Internet. This functionality was provisionally formalized in March 2006 by IEEE in the 802.11s standard. The standard still needs to go through several more IEEE approvals before it is “official.”

IEEE logoThe article pointed out that several manufacturers already have mesh technologies in their AP’s, including Motorola, Nortel, and Tropos. In our opinion, it is reasonable to expect some vendors to push pre-standard products to market prior to official IEEE approval. It is unclear how these pre-standard products will be tested for compatibility and interoperability with other vendor’s products. Vendors may take a “best shot” at their interpretation of the standard and then make their products “standard” after the fact via patches or upgrades. Of course, this patching would be done by the owners and at the owner’s expense, driving up the total cost of ownership.

Cherry, Steven. “Wi-Fi Nodes to Talk Amongst Themselves.” IEEE Spectrum. July 2006. 55-56.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.